Uncategorized

Chart your Course to Modern Virtualization in Kubernetes with Veeam Kasten

On the path to digital transformation, enterprises have increasingly turned to containerized environments to quickly and effectively deploy new revenue-generating applications. As customers increasingly explore alternatives to VMware as their virtualization provider, one key challenge they face is enhancing their investment in traditional virtualized environment infrastructures and applications while forming a plan to run a …

Chart your Course to Modern Virtualization in Kubernetes with Veeam Kasten Read More »

Accelerate operational analytics with Amazon Q Developer in Amazon OpenSearch Service

Today, I’m happy to announce Amazon Q Developer support for Amazon OpenSearch Service, providing AI-assisted capabilities to help you investigate and visualize operational data. Amazon Q Developer enhances the OpenSearch Service experience by reducing the learning curve for query languages, visualization tools, and alerting features. The new capabilities complement existing dashboards and visualizations by enabling …

Accelerate operational analytics with Amazon Q Developer in Amazon OpenSearch Service Read More »

Amazon API Gateway now supports dual-stack (IPv4 and IPv6) endpoints

Today, we are launching IPv6 support for Amazon API Gateway across all endpoint types, custom domains, and management APIs, in all commercial and AWS GovCloud (US) Regions. You can now configure REST, HTTP, and WebSocket APIs, and custom domains, to accept calls from IPv6 clients alongside the existing IPv4 support. You can also call API …

Amazon API Gateway now supports dual-stack (IPv4 and IPv6) endpoints Read More »

Akira Attacks in a Nutshell: Understanding and Detecting the Threat

Akira ransomware has cemented its reputation as one of the most relentless and disruptive cyber threats affecting organizations today. Akira has held the number one spot for six straight quarters in Coveware by Veeam’s case data, and in 2024, it was responsible for 14% of all ransomware incidents.   While many ransomware groups tend to chase …

Akira Attacks in a Nutshell: Understanding and Detecting the Threat Read More »

AWS Weekly Roundup: Amazon Bedrock, Amazon QuickSight, AWS Amplify, and more (March 31, 2025)

It’s AWS Summit season! Free events are now rolling out worldwide, bringing our cloud computing community together to connect, collaborate, and learn. Whether you prefer joining us online or in-person, these gatherings offer valuable opportunities to expand your AWS knowledge. I’ll be attending the AWS Amsterdam Summit and would love to meet you—if you’re planning …

AWS Weekly Roundup: Amazon Bedrock, Amazon QuickSight, AWS Amplify, and more (March 31, 2025) Read More »

Accelerating CI with AWS CodeBuild: Parallel test execution now available

I’m excited to announce that AWS CodeBuild now supports parallel test execution, so you can run your test suites concurrently and reduce build times significantly. With the demo project I wrote for this post, the total test time went down from 35 minutes to six minutes, including the time to provision the environments. These two …

Accelerating CI with AWS CodeBuild: Parallel test execution now available Read More »

Firewall support for AWS Amplify hosted sites

Today, we’re announcing the general availability of the AWS WAF integration with AWS Amplify Hosting. Web application owners are constantly working to protect their applications from a variety of threats. Previously, if you wanted to implement a robust security posture for your Amplify Hosted applications, you needed to create architectures using Amazon CloudFront distributions with …

Firewall support for AWS Amplify hosted sites Read More »

How to Prepare For & Survive a Cyber Attack: Critical Steps to Follow

In the digital age, where information is power, cybercriminals loom like shadowy adversaries, ready to pounce on unsuspecting organizations. These stealthy assailants are relentless, exploiting every vulnerability to breach digital fortresses, wreak havoc and compromise the integrity of business-critical data. In the ever-evolving landscape of cyber warfare, organizations must be fully equipped, prepared for the …

How to Prepare For & Survive a Cyber Attack: Critical Steps to Follow Read More »

Scroll to Top